Analysis
-
max time kernel
79s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
21/01/2023, 16:52
Static task
static1
Behavioral task
behavioral1
Sample
Screenshot Map/Screenshot Map.exe
Resource
win7-20220812-en
3 signatures
150 seconds
General
-
Target
Screenshot Map/Screenshot Map.exe
-
Size
604.7MB
-
MD5
ba1d3d2b21dec1e014e2eeb53960bc0d
-
SHA1
b18975b765c1eec576da7e9318295a0c5ac10633
-
SHA256
e5de228ce392a919b67059c57da866670d14ac05540f7e4be112289af6c4e10d
-
SHA512
0d4a955bdcab1f88cffb0138b645568aee97ea0bf0de1a61fb3442e0aa02ddc021605b70fb51b5d235fda448e85dd89101973b3d5eac2b91f4d03acc2a54ec2d
-
SSDEEP
12288:zMdwkvS0PLKHM7qZX1I5OrfQyEMPmT2rgRpA03+M4wKiTCIwEY7tRSGdg9obgP9s:QdwkvtlWZX1OWe1q
Malware Config
Extracted
Family
aurora
C2
95.217.235.8:8081
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 20 4796 powershell.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 20 IoCs
pid Process 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4796 set thread context of 1320 4796 powershell.exe 92 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4796 powershell.exe Token: SeIncreaseQuotaPrivilege 3496 wmic.exe Token: SeSecurityPrivilege 3496 wmic.exe Token: SeTakeOwnershipPrivilege 3496 wmic.exe Token: SeLoadDriverPrivilege 3496 wmic.exe Token: SeSystemProfilePrivilege 3496 wmic.exe Token: SeSystemtimePrivilege 3496 wmic.exe Token: SeProfSingleProcessPrivilege 3496 wmic.exe Token: SeIncBasePriorityPrivilege 3496 wmic.exe Token: SeCreatePagefilePrivilege 3496 wmic.exe Token: SeBackupPrivilege 3496 wmic.exe Token: SeRestorePrivilege 3496 wmic.exe Token: SeShutdownPrivilege 3496 wmic.exe Token: SeDebugPrivilege 3496 wmic.exe Token: SeSystemEnvironmentPrivilege 3496 wmic.exe Token: SeRemoteShutdownPrivilege 3496 wmic.exe Token: SeUndockPrivilege 3496 wmic.exe Token: SeManageVolumePrivilege 3496 wmic.exe Token: 33 3496 wmic.exe Token: 34 3496 wmic.exe Token: 35 3496 wmic.exe Token: 36 3496 wmic.exe Token: SeIncreaseQuotaPrivilege 3496 wmic.exe Token: SeSecurityPrivilege 3496 wmic.exe Token: SeTakeOwnershipPrivilege 3496 wmic.exe Token: SeLoadDriverPrivilege 3496 wmic.exe Token: SeSystemProfilePrivilege 3496 wmic.exe Token: SeSystemtimePrivilege 3496 wmic.exe Token: SeProfSingleProcessPrivilege 3496 wmic.exe Token: SeIncBasePriorityPrivilege 3496 wmic.exe Token: SeCreatePagefilePrivilege 3496 wmic.exe Token: SeBackupPrivilege 3496 wmic.exe Token: SeRestorePrivilege 3496 wmic.exe Token: SeShutdownPrivilege 3496 wmic.exe Token: SeDebugPrivilege 3496 wmic.exe Token: SeSystemEnvironmentPrivilege 3496 wmic.exe Token: SeRemoteShutdownPrivilege 3496 wmic.exe Token: SeUndockPrivilege 3496 wmic.exe Token: SeManageVolumePrivilege 3496 wmic.exe Token: 33 3496 wmic.exe Token: 34 3496 wmic.exe Token: 35 3496 wmic.exe Token: 36 3496 wmic.exe Token: SeIncreaseQuotaPrivilege 560 WMIC.exe Token: SeSecurityPrivilege 560 WMIC.exe Token: SeTakeOwnershipPrivilege 560 WMIC.exe Token: SeLoadDriverPrivilege 560 WMIC.exe Token: SeSystemProfilePrivilege 560 WMIC.exe Token: SeSystemtimePrivilege 560 WMIC.exe Token: SeProfSingleProcessPrivilege 560 WMIC.exe Token: SeIncBasePriorityPrivilege 560 WMIC.exe Token: SeCreatePagefilePrivilege 560 WMIC.exe Token: SeBackupPrivilege 560 WMIC.exe Token: SeRestorePrivilege 560 WMIC.exe Token: SeShutdownPrivilege 560 WMIC.exe Token: SeDebugPrivilege 560 WMIC.exe Token: SeSystemEnvironmentPrivilege 560 WMIC.exe Token: SeRemoteShutdownPrivilege 560 WMIC.exe Token: SeUndockPrivilege 560 WMIC.exe Token: SeManageVolumePrivilege 560 WMIC.exe Token: 33 560 WMIC.exe Token: 34 560 WMIC.exe Token: 35 560 WMIC.exe Token: 36 560 WMIC.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2464 wrote to memory of 4796 2464 Screenshot Map.exe 87 PID 2464 wrote to memory of 4796 2464 Screenshot Map.exe 87 PID 2464 wrote to memory of 4796 2464 Screenshot Map.exe 87 PID 4796 wrote to memory of 1320 4796 powershell.exe 92 PID 4796 wrote to memory of 1320 4796 powershell.exe 92 PID 4796 wrote to memory of 1320 4796 powershell.exe 92 PID 4796 wrote to memory of 1320 4796 powershell.exe 92 PID 4796 wrote to memory of 1320 4796 powershell.exe 92 PID 4796 wrote to memory of 1320 4796 powershell.exe 92 PID 4796 wrote to memory of 1320 4796 powershell.exe 92 PID 4796 wrote to memory of 1320 4796 powershell.exe 92 PID 4796 wrote to memory of 1320 4796 powershell.exe 92 PID 4796 wrote to memory of 1320 4796 powershell.exe 92 PID 4796 wrote to memory of 1320 4796 powershell.exe 92 PID 1320 wrote to memory of 3496 1320 aspnet_compiler.exe 93 PID 1320 wrote to memory of 3496 1320 aspnet_compiler.exe 93 PID 1320 wrote to memory of 3496 1320 aspnet_compiler.exe 93 PID 1320 wrote to memory of 1660 1320 aspnet_compiler.exe 95 PID 1320 wrote to memory of 1660 1320 aspnet_compiler.exe 95 PID 1320 wrote to memory of 1660 1320 aspnet_compiler.exe 95 PID 1660 wrote to memory of 560 1660 cmd.exe 97 PID 1660 wrote to memory of 560 1660 cmd.exe 97 PID 1660 wrote to memory of 560 1660 cmd.exe 97 PID 1320 wrote to memory of 2632 1320 aspnet_compiler.exe 98 PID 1320 wrote to memory of 2632 1320 aspnet_compiler.exe 98 PID 1320 wrote to memory of 2632 1320 aspnet_compiler.exe 98 PID 2632 wrote to memory of 3060 2632 cmd.exe 100 PID 2632 wrote to memory of 3060 2632 cmd.exe 100 PID 2632 wrote to memory of 3060 2632 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\Screenshot Map\Screenshot Map.exe"C:\Users\Admin\AppData\Local\Temp\Screenshot Map\Screenshot Map.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:/Windows/SysWOW64/WindowsPowerShell/v1.0/powershell.exe"2⤵
- Blocklisted process makes network request
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET/Framework/v4.0.30319/aspnet_compiler.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get Caption4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3496
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic path win32_VideoController get name"4⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path win32_VideoController get name5⤵
- Suspicious use of AdjustPrivilegeToken
PID:560
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic cpu get name"4⤵
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name5⤵PID:3060
-
-
-
-